Page 9 of 214 results (0.007 seconds)

CVSS: 6.1EPSS: 3%CPEs: 3EXPL: 2

31 Dec 2002 — Cross-site scripting (XSS) vulnerability in the default ASP pages on Microsoft Site Server 3.0 on Windows NT 4.0 allows remote attackers to inject arbitrary web script or HTML via the (1) ctr parameter in Default.asp and (2) the query string to formslogin.asp. • https://www.exploit-db.com/exploits/21260 •

CVSS: 10.0EPSS: 7%CPEs: 43EXPL: 0

23 Dec 2002 — Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to execute arbitrary code by including a Java applet that invokes COM (Component Object Model) objects in a web site or an HTML mail. La Máquina Virtual de Microsoft (VM) hasta 5.0.3805 inclusive permite a atacantes remotos ejecutar código arbitrario incluyendo un applet de Java que invoca objetos COM (Component Object Model) en un sitio web o en un correo HTML. • http://www.securityfocus.com/bid/6371 •

CVSS: 9.1EPSS: 4%CPEs: 43EXPL: 0

23 Dec 2002 — The Java Database Connectivity (JDBC) APIs in Microsoft Virtual Machine (VM) 5.0.3805 and earlier allow remote attackers to bypass security checks and access database contents via an untrusted Java applet. Las APIs de conectividad de base de datos Java (JDBC) en Microsoft Virtual Machine (VM) 5.0.3805 y anteriores permiten a los atacantes remotos eludir las comprobaciones de seguridad y acceder al contenido de la base de datos a través de un applet Java no fiable. • http://www.ciac.org/ciac/bulletins/n-026.shtml •

CVSS: 5.0EPSS: 5%CPEs: 43EXPL: 0

23 Dec 2002 — Microsoft Virtual Machine (VM) build 5.0.3805 and earlier allows remote attackers to determine a local user's username via a Java applet that accesses the user.dir system property, aka "User.dir Exposure Vulnerability." Microsoft Virtual Machine (VM) build versión 5.0.3805 y anteriores permite a los atacantes remotos determinar el nombre de usuario de un usuario local a través de un applet de Java que accede a la propiedad del sistema user.dir, también conocida como "User.dir Exposure Vulnerability". • http://www.securityfocus.com/bid/6380 •

CVSS: 7.5EPSS: 1%CPEs: 43EXPL: 0

17 Dec 2002 — Two vulnerabilities in Microsoft Virtual Machine (VM) up to and including build 5.0.3805, as used in Internet Explorer and other applications, allow remote attackers to read files via a Java applet with a spoofed location in the CODEBASE parameter in the APPLET tag, possibly due to a parsing error. Dos vulnerabilidades en la Máquina Virtual de Microsoft (VM) hasta 5.0.3805 inclusive, como la usada en Internet Explorer y otras aplicaciones, permite a atacantes remotos leer ficheros mediante un applet Java co... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-069 •

CVSS: 9.8EPSS: 11%CPEs: 3EXPL: 2

11 Dec 2002 — Microsoft Windows 98 and Windows NT 4.0 do not properly verify the Basic Constraints of digital certificates, allowing remote attackers to execute code, aka "New Variant of Certificate Validation Flaw Could Enable Identity Spoofing" (CAN-2002-0862). Microsoft Windows 98 y Windows NT 4.0 no verifican las Restricciones Básicas de certificados digitales, permitiendo a atacantes remotos ejecutar código, también conocida como "Nueva Variante de Fallo en Validación de Certificado Podría Permitir Suplantación de I... • https://www.exploit-db.com/exploits/21692 •

CVSS: 7.8EPSS: 0%CPEs: 28EXPL: 0

12 Nov 2002 — The system root folder of Microsoft Windows 2000 has default permissions of Everyone group with Full access (Everyone:F) and is in the search path when locating programs during login or application launch from the desktop, which could allow attackers to gain privileges as other users via Trojan horse programs. La carpeta raíz de sistema de Microsoft Windows 2000 tienen permisos por defecto de accesso total para todos los usuarios, y está en el camino de búsqueda cuando se localizan programas durante el inic... • http://www.securityfocus.com/bid/5415 •

CVSS: 7.8EPSS: 21%CPEs: 46EXPL: 0

10 Oct 2002 — The HTML Help facility in Microsoft Windows 98, 98 Second Edition, Millennium Edition, NT 4.0, NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP uses the Local Computer Security Zone when opening .chm files from the Temporary Internet Files folder, which allows remote attackers to execute arbitrary code via HTML mail that references or inserts a malicious .chm file containing shortcuts that can be executed, aka "Code Execution via Compiled HTML Help File." • http://www.iss.net/security_center/static/10254.php •

CVSS: 9.8EPSS: 50%CPEs: 46EXPL: 1

05 Oct 2002 — Buffer overflow in the HTML Help ActiveX Control (hhctrl.ocx) in Microsoft Windows 98, 98 Second Edition, Millennium Edition, NT 4.0, NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute code via (1) a long parameter to the Alink function, or (2) script containing a long argument to the showHelp function. Desbordamiento de búfer en el control ActiveX de ayuda HTML (hhctrl.ocx) en Microsoft Windows 98, 98 SE, Me, NT4, 2000 y XP, permite a atacantes remotos ejecutar ... • https://www.exploit-db.com/exploits/21902 •

CVSS: 7.5EPSS: 8%CPEs: 22EXPL: 0

01 Oct 2002 — Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol." • http://marc.info/?l=bugtraq&m=103235960119404&w=2 •